retreat
play

Retreat IT Presentation Rick OToole Phishing Awareness What is - PowerPoint PPT Presentation

School of Fin ine Arts Retreat IT Presentation Rick OToole Phishing Awareness What is Phishing? Phishing is the attempt to obtain personal information such as passwords and logins for malicious purposes. By appearing to be legitimate the


  1. School of Fin ine Arts Retreat IT Presentation Rick O’Toole

  2. Phishing Awareness What is Phishing? Phishing is the attempt to obtain personal information such as passwords and logins for malicious purposes. By appearing to be legitimate the sender is trying to trick you into providing valuable information. This may include account information, credit card or social security numbers. These fraudulent attempts may come to your university or personal email accounts. How to detect? • Generic signature line/greeting • Incorrect email fields or contact information • Be on the look out for bad spelling or grammar • Hover over links with your cursor to and see what the URL actually is before clicking • Do not save/download any attachments you receive in a suspicious email You receive a suspicious email. What to do? • Do not click on any questionable links. • Never provide your password or personal information. • Forward a suspected email to reportphishing@uconn.edu • Monitor your bank and other accounts • Contact university ITS Help Center at 860-486-4357 or online at helpcenter.uconn.edu

  3. Univ iversity Email il System and Threat Prevention UConn email sent out in June: The university email system has filters that block the bulk of spam messages from being delivered to your mailbox…starting on June 25, 2018, Information Technology Services (ITS) implemented new filtering capabilities that are designed to provide better protection from malicious emails and any viruses and malware they may contain. This update will alter how Office 365 handles the following: Spam: Mail that is identified as spam will have a {SPAM?} tag in the subject line and will go into your Junk mail folder. It will remain there until you choose to delete it. Unsafe Mail: Mail marked as potentially malicious, such as phishing messages, will be quarantined and deleted after 30 days. You will receive a digest message from Office 365 that lists all quarantined messages from the past 24 hours and provides options for managing individual messages. Links: All URLs are rewritten through Outlook. When you hover over the link in a message, it will display a variation of http://na01.safelinks.protection.outlook.com/. If a link is safe, you will still go to the intended location. If a link is unsafe, you will see a warning message. Attachments: All attachments are scanned for malware, and access to attachments considered unsafe will be blocked. More information about the threat prevention service is available at https://email.uconn.edu/threat-prevention/

  4. Network File Services University ITS provides various options for secure online file storage that is backed up daily. The two network drives are: P drive • P ersonal drive, aka Home directory. • Available for all faculty, staff, and students with NetID access • 50 GB of maximum storage • For university-related work and only accessible by you Q Drive • Department or workgroup shared directories • Access to folders will vary depending upon your permissions, work responsibilities • Ideal for saving & sharing the institutional work with your colleagues

  5. Cloud-based File Services The indirect file services provided by UConn are: OneDrive (https://office365.uconn.edu ) • Part of the Microsoft Office 365 suite • Available to Faculty, Staff and Student workers • Can sync files on your computer • Folders and files in can be shared with other UConn faculty, staff, and student workers • Up to 1 terabyte of storage Google Drive (https://email.uconn.edu/g-suite/ ) • Part of the G Suite (formerly known as Google Apps for Education) • Students automatically have access; Faculty and Staff may opt-in • 15GB of free storage

  6. File Sharing Options File Locker (https://web2.uconn.edu/filelocker/ ) • Secure method for sharing large files • Sender/uploader and recipient use NetID for authentication • Files are stored temporarily (up to 6 months) • Maximum file size of 2GB, can request more File Drop Box (https://dropbox.uconn.edu/dropbox ) • Available only for faculty and staff • Not for sensitive data. (For that, use Filelocker) • Sender/uploader has to share a link to file to the recipient(s) • Maximum of 10GB of storage space • Files over 10Mb are deleted after 14 days, others for 30

  7. Mobile Devices – Access fr from Home Should you require access to your P drive, Q drive or other UConn network resources from off-campus, such as home or away, you can using thanks to UConn's VPN services. Pulse Secure is the VPN Client provided by UConn. For Mac and Windows • https://remoteaccess.uconn.edu/ Web connection is also possible directly through your browser • http://sslvpn.uconn.edu/

  8. Mobile Devices – Microsoft Office • As part of Office 365 all faculty, staff, and students have access to Microsoft’s office applications available on their Mobile/Personal devices. • For mobile devices you just download Office apps through your normal method and sign in using your university email account. • Outlook for email, OneDrive for files

  9. Software for home use • For personal computers you can download Microsoft software at https://www.uconn.onthehub.com/ • Includes Office apps for both Mac or Windows machines • Windows operating system • Cost is under $10

  10. Technology Life Cycle Budgets and Requests • Departments have money allocated for equipment. The proper method is to submit a request to your dept head or director. • Rick can assist with pricing, quotes based on the vendors available. Please DON’T go to Surplus • Please refrain from going to Surplus in the hopes that there will be suitable technology there. • If there is something you have in mind, check with Rick first. Inventory Control • Asset Panda app (and training) necessary for submitting transfer and removal of equipment to Surplus. • Expect ~2 weeks before equipment is picked up.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend